首页 > 最新文献

2013 3rd IEEE International Advance Computing Conference (IACC)最新文献

英文 中文
Route prediction using trip observations and map matching 利用行程观察和地图匹配进行路线预测
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514292
V. Tiwari, Arti Arya, Sudha Chaturvedi
This paper uses location data traces (from GPS, Mobile Signals etc.) of past trips of vehicles to develop algorithm for predicting the end-to-end route of a vehicle. Focus is on overall route prediction rather than predicting road segments in short term. Researches in past for route prediction makes use of raw location data traces data decomposed into trips for such route predictions. This paper introduces an additional step to convert trips composed of location data traces points to trips of road network edges. This requires the algorithm to make use of road networks. We show that efficiency in storage and time complexity can be achieved without sacrificing the accuracy by doing so. Moreover, its well-known that location traces data has inherent inaccuracies due to hardware limitations of devices. Most of the researches don't handle it. This paper presents the results of route prediction algorithms under inaccuracies in data.
本文利用车辆过往行程的位置数据轨迹(来自GPS、移动信号等),开发预测车辆端到端路线的算法。重点是整体路线的预测,而不是预测路段的短期。以往的路线预测研究是利用原始位置数据的轨迹数据分解为行程进行路线预测。本文介绍了将由位置数据轨迹点组成的行程转换为路网边缘行程的附加步骤。这需要算法利用道路网络。我们证明了这样做可以在不牺牲准确性的情况下实现存储效率和时间复杂度。此外,众所周知,由于设备的硬件限制,位置跟踪数据具有固有的不准确性。大多数的研究都无法解决这个问题。本文介绍了在数据不准确情况下的航路预测算法的结果。
{"title":"Route prediction using trip observations and map matching","authors":"V. Tiwari, Arti Arya, Sudha Chaturvedi","doi":"10.1109/IADCC.2013.6514292","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514292","url":null,"abstract":"This paper uses location data traces (from GPS, Mobile Signals etc.) of past trips of vehicles to develop algorithm for predicting the end-to-end route of a vehicle. Focus is on overall route prediction rather than predicting road segments in short term. Researches in past for route prediction makes use of raw location data traces data decomposed into trips for such route predictions. This paper introduces an additional step to convert trips composed of location data traces points to trips of road network edges. This requires the algorithm to make use of road networks. We show that efficiency in storage and time complexity can be achieved without sacrificing the accuracy by doing so. Moreover, its well-known that location traces data has inherent inaccuracies due to hardware limitations of devices. Most of the researches don't handle it. This paper presents the results of route prediction algorithms under inaccuracies in data.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124339334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
Fuzzy-controlled cache management (FCM) in Experience-based Energy-efficient Routing Protocol in ad hoc networks 自组织网络中基于经验的节能路由协议中的模糊控制缓存管理
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514235
A. Banerjee, P. Dutta, Subhankar Ghosh
A mobile ad hoc network is an infrastructure less network where the nodes can move freely in any direction. Since the nodes have limited battery power, energy efficient route discovery mechanisms are critical for proper performance of this kind of networks. Experience-based Energy-efficient Routing Protocol (EXERP) [1] is one such protocol that intelligently addresses this issue and it requires two caches, namely, history cache (H-cache) and packet cache (P-cache). These two caches are dependent upon one another. In this article, we propose a fuzzy controlled cache management (FCM) technique for EXERP in ad hoc networks. Simulation results establish that the proposed scheme achieves a high hit ratio at low complexity than other cache management schemes.
移动自组织网络是一种基础设施较少的网络,节点可以在任何方向上自由移动。由于节点的电池电量有限,高效的路由发现机制对这种网络的性能至关重要。基于经验的节能路由协议(Experience-based efficient Routing Protocol, exrp)[1]就是智能解决这一问题的一种协议,它需要两个缓存,即历史缓存(H-cache)和数据包缓存(P-cache)。这两个缓存是相互依赖的。在本文中,我们提出了一种模糊控制缓存管理(FCM)技术用于自组织网络中的exp。仿真结果表明,与其他缓存管理方案相比,该方案具有较高的命中率和较低的复杂度。
{"title":"Fuzzy-controlled cache management (FCM) in Experience-based Energy-efficient Routing Protocol in ad hoc networks","authors":"A. Banerjee, P. Dutta, Subhankar Ghosh","doi":"10.1109/IADCC.2013.6514235","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514235","url":null,"abstract":"A mobile ad hoc network is an infrastructure less network where the nodes can move freely in any direction. Since the nodes have limited battery power, energy efficient route discovery mechanisms are critical for proper performance of this kind of networks. Experience-based Energy-efficient Routing Protocol (EXERP) [1] is one such protocol that intelligently addresses this issue and it requires two caches, namely, history cache (H-cache) and packet cache (P-cache). These two caches are dependent upon one another. In this article, we propose a fuzzy controlled cache management (FCM) technique for EXERP in ad hoc networks. Simulation results establish that the proposed scheme achieves a high hit ratio at low complexity than other cache management schemes.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"1 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124378449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MapReduce based log file analysis for system threats and problem identification 基于MapReduce的日志文件分析,用于系统威胁和问题识别
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514334
S. Vernekar, A. Buchade
Log files are primary source of information for identifying the System threats and problems that occur in the System at any point of time. These threats and problem in the system can be identified by analyzing the log file and finding the patterns for possible suspicious behavior. The concern administrator can then be provided with appropriate alter or warning regarding these security threats and problems in the system, which are generated after the log files are analyzed. Based upon this alters or warnings the administrator can take appropriate actions. Many tools or approaches are available for this purpose, some are proprietary and some are open source. This paper presents a new approach which uses a MapReduce algorithm for the purpose of log file analysis, providing appropriate security alerts or warning. The results of this system can then be compared with the tools available.
日志文件是识别系统威胁和系统在任何时间点发生的问题的主要信息来源。可以通过分析日志文件和查找可能的可疑行为的模式来识别系统中的这些威胁和问题。然后,可以向关注管理员提供有关系统中这些安全威胁和问题的适当更改或警告,这些威胁和问题是在分析日志文件后生成的。根据这些修改或警告,管理员可以采取适当的措施。有许多工具或方法可用于此目的,有些是专有的,有些是开放源码的。本文提出了一种新的方法,使用MapReduce算法对日志文件进行分析,提供适当的安全警报或警告。然后可以将该系统的结果与现有工具进行比较。
{"title":"MapReduce based log file analysis for system threats and problem identification","authors":"S. Vernekar, A. Buchade","doi":"10.1109/IADCC.2013.6514334","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514334","url":null,"abstract":"Log files are primary source of information for identifying the System threats and problems that occur in the System at any point of time. These threats and problem in the system can be identified by analyzing the log file and finding the patterns for possible suspicious behavior. The concern administrator can then be provided with appropriate alter or warning regarding these security threats and problems in the system, which are generated after the log files are analyzed. Based upon this alters or warnings the administrator can take appropriate actions. Many tools or approaches are available for this purpose, some are proprietary and some are open source. This paper presents a new approach which uses a MapReduce algorithm for the purpose of log file analysis, providing appropriate security alerts or warning. The results of this system can then be compared with the tools available.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128182267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Recommendation of optimized web pages to users using Web Log mining techniques 使用web日志挖掘技术向用户推荐优化的网页
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514368
R. Bhushan, R. Nath
Now a days, user rely on the web for information, but the currently available search engines often gives a long list of results, much of which are not always relevant to the user's requirement. Web Logs are important information repositories, which record user activities on the search results. The mining of these logs can improve the performance of search engines, since a user has a specific goal when searching for information. Optimized search may provide the results that accurately satisfy user's specific goal for the search. In this paper, we propose a web recommendation approach which is based on learning from web logs and recommends user a list of pages which are relevant to him by comparing with user's historic pattern. Finally, search result list is optimized by re-ranking the result pages. The proposed system proves to be efficient as the pages desired by the user, are on the top in the result list and thus reducing the search time.
如今,用户依赖网络获取信息,但目前可用的搜索引擎通常会给出一长串结果,其中许多结果并不总是与用户的需求相关。Web日志是重要的信息库,它记录了用户在搜索结果中的活动。挖掘这些日志可以提高搜索引擎的性能,因为用户在搜索信息时有一个特定的目标。优化后的搜索可以提供准确满足用户特定搜索目标的结果。在本文中,我们提出了一种基于web日志学习的web推荐方法,通过与用户历史模式的比较,向用户推荐与他相关的页面列表。最后,通过对结果页面重新排序来优化搜索结果列表。所提出的系统被证明是高效的,因为用户想要的页面在结果列表的顶部,从而减少了搜索时间。
{"title":"Recommendation of optimized web pages to users using Web Log mining techniques","authors":"R. Bhushan, R. Nath","doi":"10.1109/IADCC.2013.6514368","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514368","url":null,"abstract":"Now a days, user rely on the web for information, but the currently available search engines often gives a long list of results, much of which are not always relevant to the user's requirement. Web Logs are important information repositories, which record user activities on the search results. The mining of these logs can improve the performance of search engines, since a user has a specific goal when searching for information. Optimized search may provide the results that accurately satisfy user's specific goal for the search. In this paper, we propose a web recommendation approach which is based on learning from web logs and recommends user a list of pages which are relevant to him by comparing with user's historic pattern. Finally, search result list is optimized by re-ranking the result pages. The proposed system proves to be efficient as the pages desired by the user, are on the top in the result list and thus reducing the search time.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130458572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
An efficient approach for the detection of node misbehaviour in a MANET based on link misbehaviour 一种基于链路错误行为的MANET节点错误行为检测方法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514293
S. Samreen, G. Narasimha
Mobile Ad hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks because of the features like unreliability of wireless links between nodes, constantly changing topology, restricted battery power, lack of centralized control and others. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power. In this paper, we present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. The approach is based on the usage of two techniques which will be used in parallel in such a way that the results generated by one of them are further processed by the other to finally generate the list of misbehaving nodes. The first part detects the misbehaving links using the 2ACK technique and this information is fed into the second part which uses the principle of conservation of flow (PFC) technique to detect the misbehaving node. The problem with the 2ACK algorithm is that it can detect the misbehaving link but cannot decide upon which one of the nodes associated with that link are misbehaving. Hence we use the principle of conservation of flow, PFC for the second part which detects the misbehaving nodes associated with that of the misbehaving link.
由于节点间无线链路不可靠、拓扑结构不断变化、电池电量受限、缺乏集中控制等特点,移动自组网(manet)的有效运行容易受到各种安全攻击的影响。节点可能会表现失常,因为它们是恶意的,故意希望破坏网络,或者因为它们是自私的,希望保存自己有限的资源,比如电力。在本文中,我们提出了一种机制,可以检测出表现出数据包转发错误行为的节点。该方法基于两种技术的使用,这两种技术将并行使用,其中一种技术生成的结果由另一种技术进一步处理,最终生成行为不端的节点列表。第一部分使用2ACK技术检测行为不端的链路,并将这些信息馈送到第二部分,第二部分使用流量守恒原理(PFC)技术检测行为不端的节点。2ACK算法的问题在于,它可以检测到行为不正常的链路,但不能确定与该链路相关联的哪个节点行为不正常。因此,我们使用流量守恒原理,PFC作为第二部分,它检测与行为不端的链路相关的行为不端的节点。
{"title":"An efficient approach for the detection of node misbehaviour in a MANET based on link misbehaviour","authors":"S. Samreen, G. Narasimha","doi":"10.1109/IADCC.2013.6514293","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514293","url":null,"abstract":"Mobile Ad hoc networks (MANETs) are susceptible to having their effective operation compromised by a variety of security attacks because of the features like unreliability of wireless links between nodes, constantly changing topology, restricted battery power, lack of centralized control and others. Nodes may misbehave either because they are malicious and deliberately wish to disrupt the network, or because they are selfish and wish to conserve their own limited resources such as power. In this paper, we present a mechanism that enables the detection of nodes that exhibit packet forwarding misbehavior. The approach is based on the usage of two techniques which will be used in parallel in such a way that the results generated by one of them are further processed by the other to finally generate the list of misbehaving nodes. The first part detects the misbehaving links using the 2ACK technique and this information is fed into the second part which uses the principle of conservation of flow (PFC) technique to detect the misbehaving node. The problem with the 2ACK algorithm is that it can detect the misbehaving link but cannot decide upon which one of the nodes associated with that link are misbehaving. Hence we use the principle of conservation of flow, PFC for the second part which detects the misbehaving nodes associated with that of the misbehaving link.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134181109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Novel approach for loss reduction in LPF for satellite communication system 卫星通信系统LPF损耗降低的新方法
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514222
Kiran P. Singh, A. Paliwal, M. D. Upadhyay
This paper gives an approach for loss reduction in the design of maximally flat low pass filter (LPF) using two different methods. First using defected ground structure (DGS) and second by using series of grounded patches (SGP) for surface wave compensation. The fourth order maximally flat low pass filter is designed at cut-off frequency of 3 GHz. To achieve arbitrary cut-off frequency and impedance level specification, it is converted to low pass filter using frequency scaling and impedance transform. Loss reduction is investigated first by defected ground structure and then for series of grounded patches structure (SGP) of small square patches of 2 mm by 2mm on microstripline. The simulation is performed using PUFF and IE3D software and simulation results are reported. Simulation result shows improvement in reflection co-efficient for 3 GHz cut-off frequency by −7.18 dB for filter with DGS and −2.56 dB for filter with SGP, in comparison with simple LPF. However, for 2.68 GHz frequency, LPF with SGP shows −20.18 dB improvements. All the three filters are fabricated i.e. without defected ground, with defected ground and with series of grounded patches. Measured results of all three fabricated low pass filters, using vector network analyser are presented. Insertion loss, radiation loss, transmission loss and return loss are calculated on the basis of the measured and simulated parameters and group delays of each filter are reported. Comparative insight with different losses, group delay and theoretical and practical values for three filters are presented and shows good agreement.
本文用两种不同的方法给出了设计最平坦低通滤波器(LPF)时降低损耗的方法。首先采用缺陷接地结构(DGS),其次采用一系列接地片(SGP)进行表面波补偿。设计了截止频率为3ghz的四阶最大平坦低通滤波器。为了实现任意截止频率和阻抗电平规格,通过频率缩放和阻抗变换将其转换为低通滤波器。首先研究了缺陷接地结构降低损耗的方法,然后研究了微带状线上2mm × 2mm小正方形贴片的接地贴片系列结构(SGP)。利用PUFF和IE3D软件进行了仿真,并给出了仿真结果。仿真结果表明,在3 GHz截止频率下,与简单LPF相比,DGS滤波器的反射系数提高了−7.18 dB, SGP滤波器的反射系数提高了−2.56 dB。然而,在2.68 GHz频率下,采用SGP的LPF提高了−20.18 dB。这三种滤波器均采用无缺陷地、有缺陷地和一系列接地片的方式制造。本文给出了用矢量网络分析仪对三种低通滤波器的测量结果。根据实测参数和仿真参数计算了各滤波器的插入损耗、辐射损耗、传输损耗和回波损耗,并报告了各滤波器的群时延。对比分析了三种滤波器在不同损耗、群延迟、理论值和实用值下的性能,结果一致。
{"title":"Novel approach for loss reduction in LPF for satellite communication system","authors":"Kiran P. Singh, A. Paliwal, M. D. Upadhyay","doi":"10.1109/IADCC.2013.6514222","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514222","url":null,"abstract":"This paper gives an approach for loss reduction in the design of maximally flat low pass filter (LPF) using two different methods. First using defected ground structure (DGS) and second by using series of grounded patches (SGP) for surface wave compensation. The fourth order maximally flat low pass filter is designed at cut-off frequency of 3 GHz. To achieve arbitrary cut-off frequency and impedance level specification, it is converted to low pass filter using frequency scaling and impedance transform. Loss reduction is investigated first by defected ground structure and then for series of grounded patches structure (SGP) of small square patches of 2 mm by 2mm on microstripline. The simulation is performed using PUFF and IE3D software and simulation results are reported. Simulation result shows improvement in reflection co-efficient for 3 GHz cut-off frequency by −7.18 dB for filter with DGS and −2.56 dB for filter with SGP, in comparison with simple LPF. However, for 2.68 GHz frequency, LPF with SGP shows −20.18 dB improvements. All the three filters are fabricated i.e. without defected ground, with defected ground and with series of grounded patches. Measured results of all three fabricated low pass filters, using vector network analyser are presented. Insertion loss, radiation loss, transmission loss and return loss are calculated on the basis of the measured and simulated parameters and group delays of each filter are reported. Comparative insight with different losses, group delay and theoretical and practical values for three filters are presented and shows good agreement.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131792943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Rapid upgradation and remote service station facitity for embedded based systems 嵌入式系统的快速升级和远程服务站设施
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514219
V. Deotare, D. Padole, V. K. Mohanty
This paper emphasis on the necessity of fast and cost effective services in embedded domain and the method of accomplishing it. Here the service provider will access the system from remote end using internet and run a diagnostic s/w. And take corrective action like s/w updates, notifications etc. Some of the common known corrective actions are preloaded by the manufacturer on to the ROM memory in the system. And for those which are newly occurring will get rapid upgradation from the remote end.
本文重点讨论了嵌入式领域快速、经济高效服务的必要性和实现方法。在这里,服务提供商将使用internet从远程端访问系统并运行诊断服务器/服务器。并采取纠正措施,如s/w更新,通知等。一些常见的已知的纠正措施是由制造商预先加载到系统中的ROM存储器上的。对于那些新出现的将从远程端得到快速升级。
{"title":"Rapid upgradation and remote service station facitity for embedded based systems","authors":"V. Deotare, D. Padole, V. K. Mohanty","doi":"10.1109/IADCC.2013.6514219","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514219","url":null,"abstract":"This paper emphasis on the necessity of fast and cost effective services in embedded domain and the method of accomplishing it. Here the service provider will access the system from remote end using internet and run a diagnostic s/w. And take corrective action like s/w updates, notifications etc. Some of the common known corrective actions are preloaded by the manufacturer on to the ROM memory in the system. And for those which are newly occurring will get rapid upgradation from the remote end.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133382271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of anthropomorphic multi-D.O.F master-slave manipulator 拟人化多机器人的发展。F主从操纵器
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514472
Sulabh Kumra, S. Mehta, R. Singh
We developed a robotic arm for a master-slave system to support tele-operation of an anthropomorphic robot, which realizes remote dexterous manipulation tasks. In this paper, we describe the design and specifications of the experimental setup of the master-slave arm to demonstrate the feasibility of the tele-operation using exoskeleton. The paper explores the design decisions and trade-offs made in achieving this combination of price and performance. We developed the 6-degree-of-freedom slave arm and exoskeleton master for control of robotic arm.
为支持拟人机器人的远程操作,研制了一种主从系统机械臂,实现了远程灵巧操作任务。在本文中,我们描述了主从臂实验装置的设计和规格,以证明外骨骼远程操作的可行性。本文探讨了在实现这种价格和性能的组合时所做的设计决策和权衡。开发了6自由度从臂和外骨骼主臂,用于机械臂的控制。
{"title":"Development of anthropomorphic multi-D.O.F master-slave manipulator","authors":"Sulabh Kumra, S. Mehta, R. Singh","doi":"10.1109/IADCC.2013.6514472","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514472","url":null,"abstract":"We developed a robotic arm for a master-slave system to support tele-operation of an anthropomorphic robot, which realizes remote dexterous manipulation tasks. In this paper, we describe the design and specifications of the experimental setup of the master-slave arm to demonstrate the feasibility of the tele-operation using exoskeleton. The paper explores the design decisions and trade-offs made in achieving this combination of price and performance. We developed the 6-degree-of-freedom slave arm and exoskeleton master for control of robotic arm.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133789277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CBSRP: Cluster Based Secure Routing Protocol CBSRP:基于集群的安全路由协议
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514290
M. Morshed, Md. Rafiqul Islam
Cluster Based Secure Routing Protocol (CBSRP) is a MANET routing protocol that ensures secure key management and communication between mobile nodes. It uses Digital Signature and One Way Hashing technique for secure communication. According to CBSRP, it forms a group of small clusters consist of 4-5 nodes and after that the communication takes place between mobile nodes. Inside a cluster, there is always a cluster node or cluster head. The cluster head inside the cluster is not permanent as other nodes stay in the queue and based on the priority new cluster node or cluster head is elected from rest of the node. Inside a cluster, mobile nodes are authenticated using One Way Hashing concept and Digital Signature is not necessary inside cluster communication. For Cluster-Cluster authentication we proposed to use Digital Signature. CBSRP ensures secure communication which will be energy efficient as we segmented the whole network into small set of clusters.
基于集群的安全路由协议(CBSRP)是一种MANET路由协议,可确保移动节点之间的密钥管理和通信安全。它使用数字签名和单向散列技术进行安全通信。根据CBSRP,它形成一组由4-5个节点组成的小集群,之后在移动节点之间进行通信。在集群内部,总是有一个集群节点或集群头。集群内的集群头不是永久性的,因为其他节点留在队列中,并根据优先级从其余节点中选出新的集群节点或集群头。在集群内部,移动节点使用单向哈希概念进行身份验证,在集群通信中不需要数字签名。对于集群-集群认证,我们建议使用数字签名。CBSRP确保了安全的通信,这将是节能的,因为我们将整个网络分割成小的集群集。
{"title":"CBSRP: Cluster Based Secure Routing Protocol","authors":"M. Morshed, Md. Rafiqul Islam","doi":"10.1109/IADCC.2013.6514290","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514290","url":null,"abstract":"Cluster Based Secure Routing Protocol (CBSRP) is a MANET routing protocol that ensures secure key management and communication between mobile nodes. It uses Digital Signature and One Way Hashing technique for secure communication. According to CBSRP, it forms a group of small clusters consist of 4-5 nodes and after that the communication takes place between mobile nodes. Inside a cluster, there is always a cluster node or cluster head. The cluster head inside the cluster is not permanent as other nodes stay in the queue and based on the priority new cluster node or cluster head is elected from rest of the node. Inside a cluster, mobile nodes are authenticated using One Way Hashing concept and Digital Signature is not necessary inside cluster communication. For Cluster-Cluster authentication we proposed to use Digital Signature. CBSRP ensures secure communication which will be energy efficient as we segmented the whole network into small set of clusters.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124375149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Improving GA based automated test data generation technique for object oriented software 改进了基于遗传算法的面向对象软件自动测试数据生成技术
Pub Date : 2013-05-13 DOI: 10.1109/IADCC.2013.6514229
N. K. Gupta, M. K. Rohil
Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Extensive tests can only be achieved through a test automation process. The benefits achieved through test automation include lowering the cost of tests and consequently, the cost of whole process of software development. Several studies have been performed using this technique for automation in generating test data but this technique is expensive and cannot be applied properly to programs having complex structures. Since, previous approaches in the area of object-oriented testing are limited in terms of test case feasibility due to call dependences and runtime exceptions. This paper proposes a strategy for evaluating the fitness of both feasible and unfeasible test cases leading to the improvement of evolutionary search by achieving higher coverage and evolving more number of unfeasible test cases into feasible ones.
遗传算法已成功地应用于软件测试领域。面向对象软件测试对测试用例生成自动化的要求越来越高。广泛的测试只能通过测试自动化过程来实现。通过测试自动化获得的好处包括降低测试成本,从而降低整个软件开发过程的成本。一些研究已经使用这种技术来自动化生成测试数据,但这种技术是昂贵的,不能适当地应用于具有复杂结构的程序。由于调用依赖和运行时异常,以前面向对象测试领域的方法在测试用例可行性方面受到限制。本文提出了一种评估可行和不可行测试用例适应度的策略,通过实现更高的覆盖率并将更多的不可行测试用例演化为可行测试用例,从而改进进化搜索。
{"title":"Improving GA based automated test data generation technique for object oriented software","authors":"N. K. Gupta, M. K. Rohil","doi":"10.1109/IADCC.2013.6514229","DOIUrl":"https://doi.org/10.1109/IADCC.2013.6514229","url":null,"abstract":"Genetic algorithms have been successfully applied in the area of software testing. The demand for automation of test case generation in object oriented software testing is increasing. Extensive tests can only be achieved through a test automation process. The benefits achieved through test automation include lowering the cost of tests and consequently, the cost of whole process of software development. Several studies have been performed using this technique for automation in generating test data but this technique is expensive and cannot be applied properly to programs having complex structures. Since, previous approaches in the area of object-oriented testing are limited in terms of test case feasibility due to call dependences and runtime exceptions. This paper proposes a strategy for evaluating the fitness of both feasible and unfeasible test cases leading to the improvement of evolutionary search by achieving higher coverage and evolving more number of unfeasible test cases into feasible ones.","PeriodicalId":325901,"journal":{"name":"2013 3rd IEEE International Advance Computing Conference (IACC)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-05-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124405684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2013 3rd IEEE International Advance Computing Conference (IACC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1